Reyptson malware launches its own spam campaign

Reyptson virus operates as crypto-threat capable of encrypting netizens' data with the AES cipher. After the process, the malware appends .REYPTSON file extension to the data. Since the virus is written in the Spanish users, the malware targets users of this country.

Furthermore, recent analysis has revealed the threat's tendency to hack victims' Thunderbird contact list and plague its contacts with fraudulent invoices messages. Now it clearly prefers Spanish netizen. They are expected to receive the biggest share of such emails. At the moment one of the counterfeited senders is Folcan S.L. Facturación.

The developers have devised the GUI which leads users to the following pages of the file recovery. In the Como_Recuperar_Tus_Ficheros.txt file, the perpetrators instruct victims to pay 200€ within 72 hours. If a victim fails to do that within the specified amount of time, the sum of the ransom increases up to 500 euros. Its origin is still not fully investigated, but its trojan, Trojan.Zusy.D3C2E4 or Ransom.FileCryptor, suggests that it is related to some previous crypto-malware, for instance, FileIce ransomware which occupied the system via the similar trojan.

The malware exploits several methods of distribution: RDP, trojans, and spam emails. What is more, the malware also targets a wide choice of file formats. Regarding never-seen before features, this threat surely seems to be the result of professional cyber criminals. Luckily, multiple security tools are able to detect the infection so that you can remove Reyptson. For instance, Reimage or Plumbytes Anti-MalwareNorton Internet Security might be of assistance when eliminating the malware.

Europe is getting targeted more

While the US happens to be the country which is the most frequent source and destination of crypto-malware, more international threats are spicing things up in the market. Speaking of international threats, Spanish-oriented[2] threats are becoming a norm.

In comparison with the recently emerged threats, Reyptson malware happens to be quite a complex threat. In the ransom message, the malware indicates the .onion website address: http://37z2akkbd3vqphw5.omon/7usuario…., though it connects to multiple websites.

The malware roots in the system quite much. It disperses its file in several Appdata locations. Reyptson threat also leaves its entry among the registry files, launches multiple processes. Thus, during the infection, you may spot that the computer starts underperforming[3]. Another significant feature is its distribution.

Ways to spread the infections and prevention tips

It is a common tendency among the hackers to disguise the files under the names of the application. %APPDATA%\Spotify\SpotifyWebHelper\SpotifyWebHelper.pdf, HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v, Spotify Web Helper v1.0[4], SpotifyWebHelper.exe, SpotifyWebHelper.pdf, Spotify.vbs suggest that the infection mainly spreads via the corrupted version of Spotify. Netizens should beware of factura.pdf.exe as well.

It will be appended to the fake invoice. Once a victim opens the file, the malware connects to Command and Control server. It will then retrieve a unique ID specific to the victims' device. Additionally, the malware will also send the request for UJBTFity cookie, though its purpose remains unclear for now.

It is known that the malware also targets users via Remote Desktop Protocols. In that case, it is crucial to change the passwords and enforce the protection, but also fortify the overall security of the system. In order to do that, the anti-virus and anti-malware security applications are necessary. Now let us proceed to Reyptson removal options.

Eliminate Reyptson virus

Though the malware entangles the system and leaves its multiple files on the system, there is still a way to get rid of the infection. Run a cyber security tool. If you cannot launch to remove Reyptson virus, then reboot the device in the Safe Mode and repeat the action. Below instructions explain the action in more detail.

Only after Reyptson removal, you may proceed to data recovery. Take a look at some of our recommended options. The automatic method will be handier as it will delete of related corrupted elements as well.

We might be affiliated with any product we recommend on the site. Full disclosure in our Agreement of Use. By Downloading any provided Anti-spyware software to remove Reyptson ransomware virus you agree to our privacy policy and agreement of use.

What to do if failed?
If you failed to remove infection using Reimage, submit a question to our support team and provide as much details as possible.

Reimage is recommended to uninstall Reyptson ransomware virus. Free scanner allows you to check whether your PC is infected or not. If you need to remove malware, you have to purchase the licensed version of Reimage malware removal tool. More information about this program can be found in Reimage review.

Log in to your infected account and start the browser. Download Reimage or other legitimate anti-spyware program. Update it before a full system scan and remove malicious files that belong to your ransomware and complete Reyptson removal.

If your ransomware is blocking Safe Mode with Networking, try further method.

When a new window shows up, click Next and select your restore point that is prior the infiltration of Reyptson. After doing that, click Next.

Now click Yes to start system restore.

Once you restore your system to a previous date, download and scan your computer with Reimage and make sure that Reyptson removal is performed successfully.

Bonus: Recover your data

Guide which is presented above is supposed to help you remove Reyptson from your computer. To recover your encrypted files, we recommend using a detailed guide prepared by 2-spyware.com security experts.

If your files are encrypted by Reyptson, you can use several methods to restore them: